原贴: https://xss.is/threads/57145/
Build your first LLVM Obfuscator 86Extending LLVM for Code Obfuscation 1 11Extending LLVM for Code Obfuscation 2 6Using LLVM to Obfuscate Your Code During Compilation 10Turning Regular Code Into Atrocities With LLVM 8Simple Packer in C 42Writing a PE packer series 22Using UPX as a security packer 8How to Write Your Own Packer 20Anatomy of a simple and popular packer 9Funtastic Packers And Where To Find Them 9[LINUX]Making our own executable packer 12
Anti-Disassembly techniques used by malware (a primer) 1 29Anti-Disassembly techniques used by malware (a primer) 2 4Anti-Disassembly Techniques and Mitigation 4Assembly “wrapping”: a technique for anti-disassembly 3The Return of Disassembly Desynchronization 2
Anti-Debug Tricks Wiki 17[WIN]The Ultimate Anti Debugging Reference 4[WIN]Anti-Debugging Techniques and Mitigation 2[WIN]Anti Debugging Protection Techniques with ExamplesWindows Anti-Debug Reference 2Beginner’s Guide to Basic Linux Anti Anti Debugging Technique 3Anti-Debug Techniques on Linux 7Advanced Techniques For Anti-Debugging 2[WIN]Process on a diet: anti-debug using job objects[WIN]New year, new anti-debug: Don’t Thread On Me
[WIN]Playing with GuLoader Anti-VM techniques 8Malware Anti-VM Techniques 24Malware Evasion Techniques 2 7Malware Evasion Techniques 3 6[WIN]Evolution of Malware Sandbox Evasion Tactics – A Retrospective Study 2How does malware know the difference between the virtual world and the real world? 5[LINUX]Easy Ways to Determine Virtualization Technology 8How anti-cheats detect system emulation 7
[WIN]Analysis, Anti-Analysis, Anti-Anti-Analysis: An Overview of the Evasive Malware Scenario 2Five Anti-Analysis Tricks That Sometimes Fool Analysts 2Obfuscation Techniques 6Mac OS X Binary Protection 1[WIN] Anti Reverse Engineering 1Evasion Techniques Wiki 4[WIN]Malware Evasion 1 1Evasive Techniques: An Introduction 4[WIN]Anti–Reverse Engineering Techniques Employed by Malware 1Hiding Process Memory Via Anti-Forensic TechniquesHiding Call To Ptrace 1[WIN]Anti-Reverse Engineering Guide 3[LINUX]Programming Linux Anti-Reversing Techniques 4Malicious cryptography techniques for unreversable (malicious or not) binaries 4Malware Armoring: The case against incident related binary analysis 1Hiding execution of unsigned code in system threads 1Lets Create An EDR… And Bypass It! Part 1 2Lets Create An EDR… And Bypass It! Part 2 2AV Bypass 4Defending Your Malware 4Exploring a New Detection Evasion Technique on Linux 3
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课